->
Lynda - Cybersecurity Awareness: Identifying Personally Identifiable Information - 651216
Lynda - Cybersecurity Awareness: Identifying Personally Identifiable Information
As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated—and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations.


Table of Contents

  • Introduction
  • 1. Definitions: What Is PII?
  • 2. PII Repositories: Where Is PII Found?
  • 3. Legal and Regulatory Influences: Why Is PII Protected?
  • 4. PII Breach Case Studies: How Can PII Be Compromised?
  • 5. PII Protection Practices
  • Conclusion
  • Lynda - Cybersecurity Awareness: Identifying Personally Identifiable Information


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss